Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.12.1483

An ID-Based Remote User Authentication Scheme in IoT  

Park, KiSung (School of Electronics Engineering, Graduate School, Kyungpook National University)
Lee, SungYup (School of Electronics Engineering, Graduate School, Kyungpook National University)
Park, YoHan (Department of Electronics Engineering, Kyungpook National University)
Park, YoungHo (School of Electronics Engineering, Kyungpook National University)
Publication Information
Abstract
Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.
Keywords
Internet of Things; Authentication; ID-based; Untraceability;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Wang, J. Liu, F. Xiao, and J. Dan, “A more Efficient and Secure Dynamic ID-based Remote User Authentication Scheme," Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009.   DOI
2 Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, and D. Qui, “Security of the Internet of Things:Perspectives and Challenges," Wireless Networks, Vol. 20, No. 8, pp. 2481-2501, 2014.   DOI
3 S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, Privacy and Trust in Internet of Things: The Road Ahead,” Computer Networks, Vol. 76, No. 15, pp. 146-164, 2015.   DOI
4 YoHan Park, and YoungHo Park, “Secure Private Key Revocation Scheme in Anonymous Cluster-Based MANETs ,” Journal of Korea Multimedia Society, Vol. 18, No. 4, pp. 499-505, 2015.   DOI
5 S. Kumari, M.K. Khan, and X. Li, “An Improved Remote User Authentication Scheme with Key Agreement,” Computers & Electrical Engineering, Vol. 40, No. 6, pp. 1997-2012, 2014.   DOI
6 M.L. Das, A. Saxena, and V.P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004.   DOI
7 Y. Chang, W. Tai, and H. Chang, “Untraceable Dynamic-identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 27, No. 11, pp. 3430-3440, 2014.   DOI
8 X. Li, J. Niu, J. Liao, and W. Liang, “Cryptanalysis of a Dynamic Identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 28, No. 2, pp. 374-382, 2015.   DOI
9 L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1987.   DOI
10 M.S. Hwang and L.H. Li, “A New Remote User Authentication Scheme using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2002.   DOI
11 B.L. Chen, W.C. Kuo, and L.C. Wuu, “Robust Smart-card-based Remote User Password Authentication Scheme,” International Journal of Communications, Vol. 27, No. 2, pp. 377-389, 2014.